Good question. A recent article in Tech Republic quoted a CompTIA IT Security Report that said that nearly half of IT managers believed their cybersecurity was “good enough.” This may be wishful thinking, or it may mean that many organizations have done the work to firm up their network defenses. What about your business or organization?
There are a few ...
Continue Reading →JUN

I am always mystified when clients of mine fall for fake tech support phone calls or browser pop-ups. Didn’t their Mom tell them not to talk to strangers? After all, they are my clients, shouldn’t they be calling me FIRST?
If I can get your user name and password, I can easily break into and use your computer and network resources just as if I were you. Bruce Schneier wrote an article recently that discussed this issue. Many of the largest exploits are started with
On Wednesday we looked at the obvious, visual symptoms of a malware infection. Today we will explore some changes in performance that can indicate that your computer is infected.
A rare Tuesday post, but this is too important to wait. If you own a Lenovo computer, you need to uninstall the Lenovo Accelerator application. A recent
Although my very first PC user experience was on an Apple IIe back in 1984, I have really been a Windows guy for the most part. Got on my first Windows PC back around 1991, and bought my first Windows PC (Windows 3.11) in 1994. I do have an iMac in my current computer collection. But lately I have been playing around more and more in the Linux platform, both Ubuntu ...
This is not a gripe about Spell-Check, although I 